Shared Vulnerabilities
If security was mainly a business owner’s responsibility, Cloud security has to become a shared responsibility between the provider and the client. Your sensitive data is at risk if you don't take up your responsibility in this shared loop.
What stays in your hands are key security protocols such as :
- protection of user’s passwords
- access restrictions to files and devices
- multi-factor authentication
The partnership involved between client and provider requires the client (business’ owner) to take preventative actions to protect their data.